End-to-end security implementation for mobile devices using TLS protocol

Size: px
Start display at page:

Download "End-to-end security implementation for mobile devices using TLS protocol"

Transcription

1 J Comput Virol DOI /s x ORIGINAL PAPER End-to-end security implementation for mobile devices using TLS protocol Baris Kayayurt Tugkan Tuglular Received: 13 January 2006 / Revised: 11 February 2006 / Accepted: 28 March 2006 Springer-Verlag France 2006 Abstract End-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms. 1 Introduction Current trends in mobile applications have been the enterprise-style applications that needed high-capacity, network-connected devices. Financial applications like banking and stock trading are common examples of B. Kayayurt (B) Havelsan, Eskisehir Yolu 7. Km., Ankara, Turkey kayayurt@bornova.ege.edu.tr T. Tuglular Department of Computer Engineering, Izmir Institute of Technology, Gulbahce Koyu, Urla, Izmir, Turkey tugkantuglular@iyte.edu.tr these kinds of applications. However, some deficiencies prevent its acceptance in e-commerce applications [12]. With more and more network connected applications, security has became one of the most popular concept in mobile community. Mobile security deals mainly with two issues: security of the physical device and its contents and security of the data in network communication. The communication of data in mobile devices is provided by the mobile networks. Mobile networks are open to many kinds of attacks. The open data communication in these networks may cause attacks against the secrecy, integrity and authenticity of data. Many vendors have proposed solutions against these security vulnerabilities. Most of these solutions are vendor-specific proprietary products or libraries. Jøsang and Sanderud [6] investigated the aspects of mobile networks and found that it is both harder and easier to implement communication security as compared to the Internet for example. They concluded that communication between mobile and fixed networks create particular problems regarding security protocol design. Data security problems can be minimized through the implementation of end-to-end security in this proxybased environment. Many mobile networks have proxy-based architecture. In this architecture, security between the mobile device and the proxy server is provided with a solution and the security between the proxy server and the destination server is provided with another solution. WTLS, announced as the security solution of WAP protocol, is such a protocol. There are two problems with proxy-based solutions. First, it decreases performance. As the data is decoded and reencoded at proxy server, it may cause latency. Second, regardless of using WTLS, a malicious operator can eavesdrop and tamper with the

2 B. Kayayurt, T. Tuglular data [10]. These attacks may be a threat to the data security between the period it is decoded and encoded. The alternative to proxy based security solutions is end-to-end security. End-to-end security refers to the securely encoding of data at the source host and decoding at the destination host. The data will not travel unencoded at any part of the communication. Transport Layer Security Protocol (TLS) and its predecessor Secure Sockets Layer (SSL) protocols are end-to-end security solutions that are commonly used in the wired world [1]. There are a number of reasons to use these protocols in the mobile world: TLS and SSL protocols have been used for many years, so their security is tested by the community and accepted as secure enough to be used by financial data communication. TLS and SSL protocols are common in wired world and may be accepted as the security protocol of Internet. Using these in mobile applications will make the integration between mobile applications and Internet easier. TLS and SSL have open specifications and many implementations. It may be relatively easy to implement these for specific needs. Both protocols are known by their resource consuming nature and the idea that they are not suitable for mobile networks. The end-to-end security solution presented in this paper is implemented for mobile devices using Java platform in order to show that it is possible and efficient to use TLS in mobile networks. Kwon et al. [8] worked on the same problem and published an end-toend security model that utilizes transport layer security to overcome WAP security problems. However, implementation of their model and related experiments with resulting values cannot be found. In this paper, only transport layer security for mobile devices has been discussed. Other security issues are out of scope of this paper. Any implementer of the transport layer security for mobile devices should be aware of the security weaknesses that the J2ME environment contains [4]. This paper presents a solution to end-to-end security needs of mobile devices, such as PDAs and mobile phones. After a brief explanation of mobile architectures is given, the proposed architecture for end-to-end security of mobile devices is described. The next section mentions the implementation details of the architecture; the development environment and some implementation issues. Then the experiment enviroment and experiments are explained together with their results. The paper ends with a discussion of the results of experiments. 2 Mobile architectures Mobile Java applications run on mobile devices, mostly mobile phones and Personal Digital Assistant (PDA) devices. Whatever the device is, the application platform has a unique architecture. This architecture consists of the device s architecture (hardware, OS, JVM, etc.), network connection architecture that connects the mobile device to the outside world and the application architecture. The mobile security protocol developed will run on the architecture explained below. 2.1 Device architecture Today, many cell phones and PDAs support Mobile Information Device Profile (MIDP) technology. Usually, cell phones have built-in support for either MIDP 1.0 or 2.0; and PDAs (mostly PALM based PDAs) support MIDP after installing the KVM (Kilobyte Virtual Machine) specific for these devices. A variety of devices from different vendors have J2ME (Java 2 Micro Edition) MIDP support [7]. In order to support this kind of flexibility and customization need, J2ME architecture is designed to be modular and scalable. Figure 1 shows the general architecture of a J2ME MIDP device with its layered approach, based on [13]. In this architecture, the host operating system communicates with the device hardware and provides services for the Java Virtual Machine (JVM) layer. JVM layer is the implementation of a Java virtual machine that is customized for a particular device s host operating system and supports a particular J2ME configuration. The configuration layer defines the minimum set of Java virtual machine features and Java class libraries available on a particular category of devices. The profile layer defines the minimum set of Application Programming Interfaces (APIs) available on a particular family of devices. The layer where Java applications are written is the Profile Layer. Mobile device operating systems control the mobile device hard- Fig. 1 J2ME device architecture [13]

3 End-to-end security implementation for mobile devices using TLS protocol ware and provide services for the JVM layer. Although MIDP applications run on top of a JVM and are independent of the operating system, the implementation of the JVM is customized for the operating system. So the operating systems capabilities define the MIDP application capabilities. The most common operating systems in MIDP supporting devices are PALM OS and Symbian OS. As in desktop, Java applications on mobile devices run on top of a virtual machine called JVM. The virtual machine is implemented in native code and may directly use operating system services. The VM of mobile devices are different from J2SE JVM because of the limited resources and device architectures of mobile devices. The K Virtual Machine (KVM) is a highly portable JVM designed from the ground up for small memory, limitedresource and network-connected devices such as cellular phones, pagers and personal organizers [13]. Configuration Layer defines the minimum set of Java virtual machine features and Java class libraries available on a particular category of devices. Connected, Limited Configuration Layer (CLDC) is the configuration specified for small, resource constraint mobile devices. CLDC specification defines Java language and virtual machine features, core libraries, input/output, networking, security and internationalization [14]. CLDC configuration does not address application lifecycle management (installation, launching, deletion), user interface, event handling and high level application model. These features are addressed by profiles implemented on top of the CLDC. Profile Layer defines the minimum set of APIs available on a particular family of devices. Profiles are implemented on top of configurations. A device can support multiple profiles. MIDP (see [15,16]) is the most common profile implemented in all J2ME profiles. MIDP defines a very limited API because of size and performance reasons. However, it can be extended with various optional packages. Bluetooth (JSR 82), Web services (JSR 172), wireless messaging (JSR 120), multimedia (JSR 135), and database connectivity are some of the optional packages developed for CLDC/MIDP environments. Device manufacturers may or may not include optional packages in their device implementations. 2.2 Network connection architecture A Wireless Local Area Network (WLAN) is a flexible data communications system that can either replace or extend a wired LAN to provide added functionality [5]. WLANs use Radio Frequency (RF) to transmit and receive data over the air without cables. Data is superimposed onto a radio wave through a process called modulation, and this carrier wave then acts as the transmission medium, taking the place of a wire. WLANs use the 2.4 Gigahertz (GHz) frequency band. WLANs offer all the features of traditional Ethernet or Token Ring networks with the addition of increased network infrastructure flexibility. This flexibility makes wireless networks an important alternative to wired-networks in small areas. WLANs provide a communication medium for wireless mobile devices (PALM, e.g.) in small areas like a building. An alternatively new technology in mobile device communication is Bluetooth. Bluetooth provides shortrange wireless connectivity over radio-frequency technology that uses the 2.4 GHz Industrial-Scientific-Medic al (ISM) band [9]. Bluetooth lets mobile devices communicate with each other up to 10 m range and 1 Mbit/s speed. The IEEE has designated its version of Bluetooth with 20 Mbit/s speed, as the IEEE standard. GPRS (General Packet Radio Service) is an enhancement of core GSM (Global System for Mobile Communications) networks that allows the rapid transfer of data bundled into packets, separate from voice or data call circuits [17]. GPRS is a 2.5 Generation (2.5G) technology that is the last stone before the coming 3G networks that will give high speed access allowing live video. GPRS data is transmitted in packets, up to the speed of 20 or 30 Kbps though the theoretical maximum speed is Kbps. GPRS set-up time is short and connection is always on. 2.3 Application architecture Client/server architecture is the main architecture for mobile network applications. In this architecture, a network-aware application residing on a wireless device, client, connects with back-end applications and servers behind a firewall or proxy gateway over a wireless network and Internet and corresponding communication protocols. Figure 2 shows the client/server architecture of a mobile application. In Figure 2, the wireless devices can be mobile phones, PDAs or two-way pagers. They have the mobile applications on top of MIDP and communicate with an antenna over a wireless communication protocol. These protocols can be Wireless-LAN on a small area or GPRS on a wide area. The antenna is directly connected to a wired network like Internet, which connects the mobile device to the back-end server systems. Mobile applications typically use HTTP as the application-level communication protocol as it is common and can pass firewalls. HTTP is the mandatory protocol in MIDP 1.0 [15] and MIDP 2.0 specifications [16].

4 B. Kayayurt, T. Tuglular Fig. 2 Environment of a typical networked wireless application [11] With MIDP 2.0, low-level socket APIs can also be used to directly communicate with the server application below the application level. TLS may provide an application-level end-to-end security on top of sockets in this architecture. The TLS implementation developed in this thesis runs on top of pure sockets and provides an application level security between a MIDP application and server back-end application. The MIDP version of the developed TLS protocol communicates with the J2SE version of the protocol and sends object data over the secure connection. The mobile device always runs the client version of TLS protocol and the back-end server always runs the server version of the TLS protocol. Peer To Peer Architecture is an alternative and new architecture for wireless devices. In this architecture, the two devices communicate directly with each other. This communication may be the direct communication of the devices over a communication medium like Bluetooth or it may be an application level communication with the two mobile applications communicating over a central server. The client side of the application is the same as the Client/Server Architecture. It uses either HTTP or lowlevel socket APIs, either stream-based or datagrambased, for network communication. The difference is in the server side. In this architecture, the server is also a mobile device. MIDP 2.0 has an API for server sockets that may be used for this purpose. The TLS implementation to work in this architecture needs both client and server versions of TLS to work in the mobile device. This may be impractical for two reasons. First, resource constraints of mobile devices may cause performance problems for server side implementation of the TLS protocol. Second, server sockets are not commonly implemented in MIDP devices. In spite of these deficiencies, the TLS implementation presented in this paper can be used in peer-to-peer architectures for experimental purposes. 3 Design of mobile devices end-to-end security architecture The security protocol presented in this paper is an endto-end security protocol based on TLS 1.0 specifications and adopted to work on J2ME mobile devices as well as standard Java VMs. The protocol implementation itself is also an application, although high-level applications may use it through its APIs to transmit data and objects securely. The security protocol architecture developed covers both TLS protocol architecture and the necessary APIs architecture. TLS protocol architecture is based on TLS 1.0 specification and has some additions and subtractions. The necessary APIs architecture involves cryptography model classes that abstract the real implementations of cryptography packages; socket classes that abstract TCP or UDP based socket implementations and the serialization of object data; XML Serializer architecture that is a standalone API incorporated into the protocol implementation. The main design issues taken into consideration during the definition of the architecture of protocol implementation are J2ME compatibility, mobile adaptation, secure object transmission, full abstraction and complete solution. The main architecture of the mobile end-to-end security protocol is based on the TLS 1.0 protocol specification [3]. TLS is a protocol that consists of several layers of protocols as shown in Figure 3. At the bottom of these layers, there is the TLS Record Protocol. The Record Protocol is responsible for taking messages to be transmitted, fragmenting into blocks, optionally compressing, applying MAC to protect data integrity, encrypting the block and transmitting the result to higher level clients. Received data is then decrypted; applied MAC is verified to protect data integrity; optionally decompressed; reassembled and then delivered to higher level clients by the Record Protocol. TLS Record Protocol

5 End-to-end security implementation for mobile devices using TLS protocol Fig. 3 The layered structure of TLS protocol blocks are transported over a reliable transport protocol like TCP. There are four clients of record protocol: TLS Handshake Protocol, TLS Alert Protocol, TLS Change Cipher Spec Protocol and application data. TLS 1.0 Specification allows new record protocol clients to be supported by the record protocol. TLS Handshake Protocol is used to allow peers to authenticate each other and to exchange cryptographic parameters that are used in TLS Protocol. TLS Handshake is performed at the beginning of a session before the application data is transmitted or received. The Change Cipher Spec Protocol is used to start to use new keys and encryption methods that the Handshake Protocol has established. TLS Alert Protocol is used to send warning and fatal level errors that could occur in TLS session. After the handshake is performed, application data is taken by Record Layer and sent securely to the other peer. In our model, the Record Layer behavior is implemented in the class RecordLayerImpl and the Handshake Layer behavior is implemented in the class HandshakeLayerImpl. This class has two instances of class RecordLayerImpl; one for current state and one for pending state. Both HandshakeLayerImpl and RecordLayerImpl classes are transparent of the underlying socket implementations and talk to the peer classes in both sides of the communication. The classes TLSClientSocket and TLSServerSocket- Listener are the only classes needed to be known by the applications that will use this implementation of the protocol. An application that needs to be the client in the secure communication must use the class TLSClient- Socket; an application that needs to be the server in the secure communication must use the class TLSServer- SocketListener. The class TLSServerSocket is used to handle a secure connection session in the server-side as a separate thread. An application may use the class TLS- SocketFactory to obtain either a TLSClientSocket class instance or a TLSServerSocketListener class instance. The mobile secure application is designed as the protocol implementation separated from the underlying communication model. This is achieved by the interface TLSSocketImpl. This interface defines the operations needed for sending and receiving of secure data and implemented by the client and server socket classes that abstract the communication details from the protocol details. Thus, the communication of data can be changed without changing any protocol dependent code. The class TLSTCPSocketImpl is the client-side implementation of the interface TLSSocketImpl as TCP based stream socket and the class TLSTCPServerSocketImpl is the server-side implementation of the interface TLSSocketImpl as TCP based stream server socket. The class TLSUDPSocketImpl is the client-side implementation of the interface TLSSocketImpl as UDP based datagram socket and the class TLSUDPServerSocket- Impl is the server-side implementation of the interface TLSSocketImpl as UDP based datagram socket. Figure 4 shows the main object model of the mobile end-to-end security protocol. The class HandshakeLayerImpl defines operations and attributes needed to perform Handshake Layer behavior and to send and receive application-level data after the establishment of a secure session. Each secure session has one instance of class HandshakeLayerImpl and the class instances at both side of the communication talk to each other. While the Handshake Layer in TLS Protocol communicates with the Record Layer to send and receive data, the HandshakeLayerImpl class uses RecordLayerImpl class to send and receive data. The class RecordLayerImpl defines operations and attributes needed to perform Record Layer behavior. The responsibilities of RecordLayerImpl class are to send and receive application and Handshake Layer data after encoding and decoding; generate new TLS keys according to the exchanged security parameters; copy security parameters from pending state to current state and activate new TLS keys for read side and write side. In TLS 1.0, the Record Layer performs encryption, MAC and compression functions according to the algorithms exchanged during handshake procedure. The Record Layer architecture of the mobile protocol is modeled to support this need in an extensible way. This is

6 B. Kayayurt, T. Tuglular Fig. 4 Main object model of the mobile end-to-end security protocol achieved with the use of the interfaces TLSEncryption, TLSMac and TLSCompression. These interfaces define the base methods to perform encryption, decryption, adding MAC, verifying MAC, compression and decompression. Algorithms are implemented in the classes implementing these interfaces. This method eases the addition of a new algorithm to the protocol implementation.

7 End-to-end security implementation for mobile devices using TLS protocol 4 Implementation of mobile devices end-to-end security architecture The mobile end-to-end security protocol is implemented in Java to be compliant to both J2ME and J2SE platforms. The development environment for mobile endto-end security protocol is JBuilder 8.0 Enterprise MobileSet 3 Integrated Development Environment. The development environment was chosen because it has an integrated MIDP application development support. A project may be compiled with MIDP libraries by changing the project JDK to J2MEWTK from the project properties window. JBuilder IDE was also chosen for its high performance, code completion feature and userfriendly interface. JBuilder IDE uses Sun Microsystem s J2ME Wireless Toolkit for MIDP development. J2ME Wireless Toolkit (J2MEWTK) is a toolkit that can be used separately or plugged into a development IDE. It provides development tools and emulators for MIDP application development. The 2.1 version of J2MEWTK is used in the development and in the experiements of the developed protocol for mobile environments. J2MEWTK 2.1 supports MIDP 2.0, CLDC 1.1, optional Wireless Messaging API (JSR 120), Mobile Media API (JSR 135) and Web Services Access for J2ME API (JSR 172). J2ME Wireless Toolkit has the tool Ktoolbar that manages MIDP application development. Ktoolbar has menu options for creating a new MIDP application, opening an existing one, compiling and running the application with the set up MIDP version, changing the J2MEWTK and application preferences. J2MEWTK uses device emulators to run MIDP applications. Device emulators are software implementations of mobile devices to test applications before the real deployment. Device emulators provide a faster and easier development for mobile applications. Most mobile phones and PALM devices have their emulator software. Mobile phone emulators are distributed by telephone vendors freely. They have the same operating system and visual interface with the original telephone. PALM emulators emulate PALM OS. A ROM file is taken from a real PALM device with Hotsync connection and loaded into the emulator software. This gives all the features of the PALM device to the emulator software including program installation and uninstallation. Some examples are also run on original PALM M100 PDAs and Nokia 6600 mobile phones. Java has been divided into three platforms: J2EE for server side development, J2SE for standard desktop applications and J2ME for small, embedded devices. J2ME has its own configurations and profiles. Each configuration and profile has its own library APIs. The main target Java platform for the mobile security protocol is J2ME platform. The configuration is CLDC and the profile is MIDP. This fact caused CLDC/MIDP APIs to be used in the implementation of the protocol. Most CLDC/MIDP language APIs are also valid in J2SE platform, that makes the developed protocol also compliant to this platform. However, because of the limits of mobile devices, network connection library has been changed. J2ME uses Generic Connection Framework (GCF) for all kinds of connections including network and file connections. This brings a lighter connection API when compared with the heavy network API of J2SE platform. J2ME version of the protocol uses GCF and the J2SE version uses java.net package for network connections. The security protocol implementation needs secure network connections to send and receive data between peers. Network connection implementations are abstracted from business logic classes and appear in socket classes that are used by other classes. J2ME uses GCF and J2SE uses java.net package network connection classes to provide network connections. The protocol implementation may use TCP and UDP sockets and server sockets for network connections between client and server. The socket connection type is determined by the constants in class TLSSocket. The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. The package is organised so that it contains a light-weight API suitable for use in any environment (including the newly released J2ME) with the additional infrastructure to conform the algorithms to the JCE framework [2]. The Bouncy Castle Crypto package can be downloaded from for free. This software is distributed under a license based on the MIT X Consortium license. 5 Experiments and discussion The mobile end-to-end security protocol was implemented mainly to be used in mobile devices, PDAs and mobile phones, for example. The implemented protocol library is loaded on a real mobile phone to show that it can run on a resource-constraint environment and establish network connection on a real wireless network. Mobile end-to-end security protocol was designed and implemented to have a reliable and maintainable protocol implementation that would have acceptable performance results. This section mentions the experiments performed to measure the performance averages of the protocol implementation. It presents the scope of experiments, the platform experiments were performed,

8 B. Kayayurt, T. Tuglular different experiment cases prepared and the evaluation of the experiment results. The result values of those experiments are shown as well. 5.1 Scope of the experiments The mobile end-to-end security protocol experiments involve the performance runs of both the client and server modes of the protocol with different cipher suites. Experiments cover both J2SE (as server) and J2ME (as client) platforms. The secure connection will be established with different cipher suites and TCP is used as the underlying network connection protocol. The experiments of the protocol are divided into two main sections: Experiment of the handshake procedure. Experiment of the application level object transmission and receiving. As the handshake procedure has many steps, it is divided into different time spans. In this way, it is aimed to measure the real performance of the steps and to define bottlenecks in the protocol implementation. Some operations will only be available in specific cipher suites. Table 1 shows the operations in both server and client modes of the protocol. Experiments were performed by using different TLS cipher suites. Server side of the program supports all cipher suites available to the mobile security protocol implementation. Each experimental client supports only one cipher suite and requests the handshake to be performed with that cipher suite when it sends ClientHello message to to the server. Thus, the connection will be established with that cipher suite. Table 2 shows cipher suites used in the protocol experiments. The first cipher suite in Table 2 is non-ephemeral, that means asymmetric keys are not generated at runtime. The other cipher suites in Table 2 are ephemeral, that means asymmetric keys are generated at run-time. Experiment results are organized to compare ephemeral cipher suite results with each other. The other compar- Table 1 Mobile security protocol operations used in experiments Operation Server Client Public key signing Public key verification Key pair generation Pre-master secret generation Master secret generation TLS keys generation All handshake ison given is between non-ephemeral RSA and ephemeral RSA. The experiments were performed according to the following scenario: A server listening to secure connection requests. A client requesting a connection with the server. Performance of the handshake procedure. Sending of an example object from client to server over the secure connection established. The example object is called Person that has the private attributes id, name and surname. 5.2 Mobile device experiment platform configuration Mobile end-to-end security protocol was designed and implemented to be run on J2ME CLDC/MIDP platforms including cellular phones and PALM PDAs. The experiments with a real mobile device are performed by running the experimental client program on a mobile phone and server program on a desktop PC. The mobile phone is a Nokia 6600 smart phone with ARM9 104 MHz CPU, 6 MB of storage memory, GPRS and Bluetooth connectivity and Symbian OS 7.0s operating system with MIDP 2.0 support. The network connection between the mobile phone and the desktop PC is provided with the GPRS connection provided by Turkcell mobile service carrier. The transport protocol used in the experiments is TCP. Mobile device experiments were performed only on J2SE-J2ME architecture mentioned in section 5.1. Experimental programs run ten times and the highest (max), lowest (min) and average time durations are measured. 5.3 Mobile device experiment results Mobile device experiments were performed according to the configuration explained above. There was no problem in establishing communication with GPRS and all experiments succeeded. Figures 6 and 7 (see Appendix) show the secure communication time span durations when the experimental client program runs on a Nokia 6600 mobile phone, the server program runs on J2SE platform and transport protocol between is TCP. All values presented in the tables are milliseconds (ms). 0 value in a table means that the time duration is below milliseconds. N/A value in a table means that the operation is not applicable in the cipher suite. Figure 5 shows the comparison chart of average client total handshake times of the experimental cipher suites when the client runs on a Nokia 6600 mobile phone and the server runs on J2SE platform and the transport

9 End-to-end security implementation for mobile devices using TLS protocol Table 2 Cipher suites used in protocol experiments Cipher suite Authentication and key Symmetric Hash exchange algorithm algorithm algorithm TLS_RSA_WITH_AES_CBC_SHA RSA AES SHA TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 RSA_EXPORT RC2 MD5 TLS_DHE_RSA_WITH_DES_CBC_SHA DHE_RSA DES SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDHE_ECDSA AES SHA Fig. 5 Client average handshake times on Nokia 6600 mobile phone protocol between is TCP. The results of the experiments performed were shown in tables given in Appendix. The handshake procedure is divided into operations. Each operation is an important step in the handshake that was expected to take a measurable time. The experiments were repeated for a definite number for each case and the resulting average, max and min values were noted. Experiment results will be evaluated according to the following criteria: Defined operations; Running platform; Network protocol; Cipher suite. All the average, min and max values increase in the J2SE-J2ME experiment results shown in Figures 6 and 7. This architecture includes a client in J2ME platform and a server in J2SE platform and expected to be widely used in real life. The lowest average total handshake value in this architecture is milliseconds of TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 cipher suite. The highest average total handshake value is 33,800 milliseconds of TLS_RSA_WITH_AES_CBC _SHA cipher suite. Considering ephemeral, the highest average total handshake value is 30,596 milliseconds of TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA cipher suite. This shows that Elliptic Curve Diffie -Hellman operations have a poor performance on J2ME platform. These results are shown in the chart in Figure 5. 6 Conclusion End-to-end security is an emerging need for mobile devices. Banking, military and other enterprise applications need more and more security to run on mobile devices. This project aimed at developing an extensible end-to-end security protocol implementation that could be used by both mobile and desktop applications. TLS protocol that is commonly used on the Internet was chosen as the base of the developed protocol implementation. The proposed protocol was designed and implemented. The implementation was run with different experiments and the time span of operations were measured. The protocol implementation run on a real Nokia 6600 mobile phone and established a secure connection with a server computer connected to the Internet over GPRS. All the experiments were successfully completed, which indicated that the protocol was properly designed and implemented with respect to specifications. The implementation guarantees the security of any transmission at most as much as TLS. The implementation did not include optional TLS specifications like client authentication, session resumption and compression. Appendix Experimental results

10 B. Kayayurt, T. Tuglular Fig. 6 Cryptographic operation durations in the mobile device experiments for ephemeral Fig. 7 Cryptographic operation durations in the mobile device experiments for RSA ciphers

11 End-to-end security implementation for mobile devices using TLS protocol References 1. Agarwal, A.K., Gill, J.S., Wang, W.: An experimental study on wireless security protocols over mobile IP networks. In: IEEE Proceedings of 60th Vehicular Technology Conference (2004) 2. BouncyCastle: Bouncy Castle Documentation. (2006) 3. Dierks, T., Allen, C.: The TLS protocol version 1.0, IETF RFC 2246 (1999) 4. Reynaud-Plantey, D.: J2ME low level security: implementation versus specification. (2005) forge.net/tinapoc/reynaud_j2me.pdf?download 5. Intel IEEE b high rate wireless local area networks, Intel Corporation (2000) 6. Jøsang, A., Sanderud, G.: Security in mobile communications: challenges and opportunities. In: Australasian Information Security Workshop (AISW2003), Australia (2003) 7. Knudsen, J.: Introduction to Wireless Java Technologies White Paper, Sun Microsystems Inc. (2001) 8. Kwon, E., Cho, Y., Chae, K.: Integrated transport layer security: end-to-end security model between WTLS and TLS. In: IEEE Proceedings of 15th International Conference on Information Networking, pp (2001) 9. Mahmoud, Q.H.: Wireless Application Programming with J2ME and Bluetooth. (2003) topics/mobility/midp/articles/bluetooth1/ 10. Mynttinen, J.: End-to-end security of mobile data in GSM. Tik Seminar on Network Security. Helsinki University of Technology (2000) 11. Ortiz, E.: The Complexity of Developing Mobile Networked Data Services, J2ME Wireless Connection Wizard For Sun ONE Studio. (2006) mobility/midp/articles/wizard/index.html 12. Soriano, M., Ponce, D.: A security and usability proposal for mobile electronic commerce. IEEE Commun Mag, 40(8) (2002) 13. Sun Microsystems: Java 2 Platform Micro Edition (J2ME) Technology for Creating Mobile Devices White Paper, Sun Microsystems Inc (2000) 14. Sun Microsystems: Connected, Limited Device Configuration 1.0a Specification, Sun Microsystems Inc. (2000) 15. Sun Microsystems: JSR Mobile Information Device Profile (MIDP) 1.0 Specification, Sun Microsystems Inc. (2000) 16. Sun Microsystems: JSR Mobile Information Device Profile 2.0 Specification, Sun Microsystems Inc. (2002) 17. Symbian: Symbian on GPRS (2001). (2001) symbian.com/technology/standard-gprs.html

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information

Web Security Considerations

Web Security Considerations CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao Dept. of CSE, KLCE Vaddeswaram,

More information

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development Nokia 9210i/9290 Communicators and Personal TM Application Development 05-03-2002 Nokia 9210i/9290 Communicators and PersonalTM Application Development Table of contents 1. DIFFERENT JAVA TECHNOLOGIES...

More information

Secure Sockets Layer

Secure Sockets Layer SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Communication Systems SSL

Communication Systems SSL Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security

More information

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Secure Socket Layer/ Transport Layer Security (SSL/TLS) Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

A Comparison of Secure Mechanisms for Mobile Commerce

A Comparison of Secure Mechanisms for Mobile Commerce A Comparison of Secure Mechanisms for Mobile Commerce Hann-Jang Ho 1 and RongJou Yang 2 1 Department of Computer Science and Information Engineering 2 Department of Information Management WuFeng Institute

More information

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

More information

Real-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610

Real-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610 Real-Time Communication Security: SSL/TLS Guevara Noubir noubir@ccs.neu.edu CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

The Secure Sockets Layer (SSL)

The Secure Sockets Layer (SSL) Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

Communication Security for Applications

Communication Security for Applications Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

SSL A discussion of the Secure Socket Layer

SSL A discussion of the Secure Socket Layer www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record

More information

Security Protocols/Standards

Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity

More information

ERserver. iseries. Securing applications with SSL

ERserver. iseries. Securing applications with SSL ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users

More information

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available

More information

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol) WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security

More information

Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems

Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems By: Kevin Finnan and Philippe Willems Introduction New security capabilities at the remote terminal unit (RTU) level are substantially easing implementation of cyber security measures in SCADA systems.

More information

Transport Level Security

Transport Level Security Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

A Comparison of Mobile Peer-to-peer File-sharing Clients

A Comparison of Mobile Peer-to-peer File-sharing Clients 1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics

More information

Computer System Management: Hosting Servers, Miscellaneous

Computer System Management: Hosting Servers, Miscellaneous Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation

More information

PrivyLink Internet Application Security Environment *

PrivyLink Internet Application Security Environment * WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security

More information

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

[SMO-SFO-ICO-PE-046-GU-

[SMO-SFO-ICO-PE-046-GU- Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection? FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,

More information

Thingsquare Technology

Thingsquare Technology Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

T-79.159 Cryptography and Data Security

T-79.159 Cryptography and Data Security T-79.159 Cryptography and Data Security Lecture 11: Security systems using public keys 11.1 PGP Kaufman et al: Ch 17, 11.2 SSL/TLS 18, 19 11.3 IPSEC Stallings: Ch 16,17 1 Pretty Good Privacy Email encryption

More information

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador jestevez@inf.uc3m.es Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,

More information

Network Security Part II: Standards

Network Security Part II: Standards Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012 Winter Term 2011/2012 Chapter 7: Transport Layer Security Protocol Key Questions Application context of TLS? Which security goals shall be achieved? Approaches? 2 Contents Overview Record Protocol Cipher

More information

What is a SSL VPN and How Does it Work?

What is a SSL VPN and How Does it Work? Acceleration of Data through SSL Virtual Private Networks Rob Jansen University of Minnesota, Morris 600 East Fourth Street Morris, MN 56267 (123) 456-7890 jans0184@morris.umn.edu ABSTRACT A Virtual Private

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Wireless ATA: A New Data Transport Protocol for Wireless Storage

Wireless ATA: A New Data Transport Protocol for Wireless Storage Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr

More information

Enabling SSL and Client Certificates on the SAP J2EE Engine

Enabling SSL and Client Certificates on the SAP J2EE Engine Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION

ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION Meenu meenucs@mmmec.net Prabhat Kumar Pankaj prabhat.cse.mmmec@gmail.com Tarkeshwar Nath tkn_001@gmail.com Computer Science & Engineering Department.

More information

A Survey of Electronic Signature Development in Mobile Devices

A Survey of Electronic Signature Development in Mobile Devices A Survey of Electronic Signature Development in Devices 1, 2, 3 and 4 1 University of Murcia, Department of Information and Communications Engineering, maria@dif.um.es 2 University of Murcia, Department

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure

Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure A Low Power Security Architecture for Mobile Commerce Peter Langendoerfer +, Zoya Dyka +, Oliver Maye + and Rolf Kraemer + Abstract: Mobile devices have limited resources in terms of computational power

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password

More information

Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems. Good morning. Ladies and Gentlemen.

Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems. Good morning. Ladies and Gentlemen. Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems Good morning. Ladies and Gentlemen. the mobile edition. I am glad to be invited to be here. Today my topic is

More information

Application Note: Onsight Device VPN Configuration V1.1

Application Note: Onsight Device VPN Configuration V1.1 Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1

More information

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

CrashPlan Security SECURITY CONTEXT TECHNOLOGY TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops

More information

Performance of Host Identity Protocol on Nokia Internet Tablet

Performance of Host Identity Protocol on Nokia Internet Tablet Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

TLS/SSL in distributed systems. Eugen Babinciuc

TLS/SSL in distributed systems. Eugen Babinciuc TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History

More information

Einführung in SSL mit Wireshark

Einführung in SSL mit Wireshark Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

More information

NFC. Technical Overview. Release r05

NFC. Technical Overview. Release r05 Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those

More information

As enterprises conduct more and more

As enterprises conduct more and more Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside

More information

Angel Dichev RIG, SAP Labs

Angel Dichev RIG, SAP Labs Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine SSL

More information

Security. Learning Objectives. This module will help you...

Security. Learning Objectives. This module will help you... Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security

More information

CSC 774 -- Network Security

CSC 774 -- Network Security CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version

More information

ITL BULLETIN FOR AUGUST 2012

ITL BULLETIN FOR AUGUST 2012 ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division

More information

, ) I Transport Layer Security

, ) I Transport Layer Security Secure Sockets Layer (SSL, ) I Transport Layer Security _ + (TLS) Network Security Products S31213 UNCLASSIFIED Location of SSL -L Protocols TCP Ethernet IP SSL Header Encrypted SSL data= HTTP " Independent

More information

CSC 474 Information Systems Security

CSC 474 Information Systems Security CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version

More information

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL Security architecture and protocol stack Applicat. (SHTTP) SSL/TLS TCP IPSEC IP Secure applications: PGP, SHTTP,

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

A Survey of Electronic Signature Solutions in Mobile Devices

A Survey of Electronic Signature Solutions in Mobile Devices Antonio Ruiz-Martínez 1, Daniel Sánchez-Martínez 2, María Martínez-Montesinos 3 and 4 University of Murcia, Department of Information and Communications Engineering, 1 arm@dif.um.es, 2 dsm@dif.um.es, 3

More information